Active Bibliography

55 Mostly-Static Decentralized Information Flow Control – Andrew C. Myers - 1999
Making distributed computation secure by construction – Lantian Zheng - 2007
211 Protecting privacy using the decentralized label model – Andrew C. Myers, Barbara Liskov - 2000
76 Stack-based Access Control and Secure Information Flow – Anindya Banerjee, David A. Naumann - 2003
66 A Model for Delimited Information Release – Andrei Sabelfeld, Andrew C. Myers - 2004
139 Robust Declassification – Steve Zdancewic, Andrew C. Myers - 2001
1 Language-Based Security for Malicious Mobile Code – Fred B. Schneider, Dexter Kozen, Greg Morrisett, Andrew C. Myers
48 Observational Determinism for Concurrent Program Security – Steve Zdancewic, Andrew C. Myers - 2003
4 Checking secure information flow in java bytecode by code transformation and standard bytecode verification – C. Bernardeschi, N. De Francesco, G. Lettieri, L. Martini
END-TO-END INFORMATION FLOW SECURITY FOR JAVA by – Mark Andrew Thober, C Mark Andrew Thober - 2007
31 Enforcing robust declassification and qualified robustness – Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic - 2006
48 Using access control for secure information flow in a Java-like language – Anindya Banerjee - 2003
DRAFT—Do not distribute Integrity Policies via a Library in Haskell – Albert Disertholf, Alejandro Russo
56 Untrusted Hosts and Confidentiality: Secure Program Partitioning – Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers - 2001
67 Secure Program Partitioning – Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers - 2001
34 Secure Information Flow via Linear Continuations – Steve Zdancewic, Andrew C. Myers - 2002
101 Secure Information Flow and Pointer Confinement in a Java-like Language – Anindya Banerjee, David A. Naumann - 2002
Securing Data at Java IO Boundaries – Scott F. Smith, Mark Thober
7 Improving usability of information flow security in java – Scott F. Smith, Mark Thober - 2007